Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument.
                
            References
                    | Link | Resource | 
|---|---|
| http://retrogod.altervista.org/php_446_ibase_connect_bof.html | Broken Link | 
| http://www.securityfocus.com/bid/22976 | Third Party Advisory VDB Entry | 
| http://secunia.com/advisories/24529 | Third Party Advisory | 
| http://securityreason.com/securityalert/2439 | Exploit Third Party Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/33019 | Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/3488 | Third Party Advisory VDB Entry | 
| http://www.securityfocus.com/archive/1/462931/100/0/threaded | Third Party Advisory VDB Entry | 
Configurations
                    Information
                Published : 2007-03-16 14:19
Updated : 2018-10-19 11:18
NVD link : CVE-2007-1475
Mitre link : CVE-2007-1475
JSON object : View
CWE
                Products Affected
                php
- php
 


